Restore topic to revision:
You will be able to review the topic before saving it to a new revision
Copy text and form data to a new topic (no attachments will be copied though).
Name of copy: Allow non WikiWord name You will be able to review the copied topic before savingRename/move topic...
scans links in all public webs(recommended)Rename/move topic...
scans links in CBI_ComputerSecurity web only
Delete topic...
scans links in all public webs(recommended)Delete topic...
scans links in CBI_ComputerSecurity web only

[X] Hide this message. Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the Universitys Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu

Computer Security in Popular, Scientific, and Managerial Literatures

This page was constructed using the Web of Knowledge database search engine, searching for computer security under the "Topic" heading, and ordering the search results chronologically from oldest to newest articles.

The Best Available Technologies for Computer Security (1983 | PDF): Computer, Vol. 16, Issue 7, 1983, p86. This article uses what has been learned from the development of computer security in military applications to assist commercial developers in creating secure systems of their own.

Computer Hacking and Security Costs (1983 | PDF): Science News, Vol. 124, No. 19, Nov. 5. 1983, p294. This article discusses the threat of a new generation of hackers who exploit known weaknesses in early telephone-linked computer systems, describing those systems as inherently insecure due to their well-known default passwords, and the ease of dialing into them through trial-and-error.

Formal Models for Computer Security (1981 | PDF): ACM Computing Surveys, Vol. 13, Issue 2, Sept. 1981, p247-278. Article discusses the previous decade's attempts at building "secure" computer systems, and the existence of systems in use in the Department of Defense containing information classified at a higher level than some of the users of those systems. The author discusses the need for formal security models to determine what exactly constitutes "secure," and how that security should be attained.

1981

general

Linowes, D. F.

Communications Satellites - Their Impact on the CPA (1981 | PDF): Journal of Accountancy, Vol. 152, Issue 3, 1981, p58. Article warns of the lack of security when transferring information, especially financial information, via satellite. The author cites examples of where fraud had already up to occurred up to 1981 using satellite funds transfer.

Social Security Computers Vulnerable, GAO Says (1978 | PDF): Science, Vol. 21, No. 4351, 1978, 142-143. This article discuses a General Accounting Office report that identifies security vulnerabilities in Social Security Administration computer systems, including the lack of safeguards around thousands of SSA terminals that are capable of creating and changing records in the central databank.

Computer Encryption and the National Security Agency Connection (1977 | PDF): Science, Vol. 197, Issue 4302, 1977, p438-440. This article discusses the controversy surrounding the National Bureau of Standards DES 56-bit encryption standard. Critics, including Martin Hellman and Whitfield Diffie, cited its short key length as vulnerable to code-breaking. The article discusses the possibility of the NSA being behind the vulnerability, so that the agency could decipher the encrypted data.

1977

general

Morris, Robert

Computer Security and the Bell System (1977 | PDF): Science, Vol. 197, No. 4305, 1977, p716. This letter is a response to Gina Bari Kolata's article in Science, Computer Encryption and the National Security Agency Connection (PDF). Morris states that he had, despite Kolata's claim, never said Bell would not use the DES encryption standard. Morris clarifies that he was a critic of the standard, but supports it as an improvement over what had existed previously.

Computer Security and IBM (1977 | PDF): Science, Vol. 197, Issue 4307, 1977, p938. This letter is in response to Gina Bari Kolata's article in Science, Computer Encryption and the National Security Agency Connection ( PDF). Tuchman states that, as a principle developer of the DES encryption standard, he had, despite Kolata's claim, not developed the standard in conjunction with the NSA, with the intention of leaving DES easy for the security agency to break for intelligence gathering purposes.

1977

general

Whiteside, Thomas

Dead Souls In the Computer (1977): The New Yorker, August 22, 1977, p35.

1977

general

Williams, J. Hutchinson, et al

A Computer-Assisted Admissions Process (1977 | PDF): The Journal of Medical Education, Vol. 52, Issue 5, 1977, p384-389. This article discusses the introduction of computerized admissions process in medical schools, and what the author believes constitutes maintaining the security of records in the system.

1977

medical

Banking

Guarding Against Computer Fraud (1976 | PDF): Banking, Vol. 68, April 1976, p36. Article warns against the rising frequency of embezzlement from "EDP" employees, who, the author argues, are often left to operate without adequate checks from others who are also knowledgable in electronic data processing.

1976

business

Brooke, R. G.

Privacy, Security and Computers - Guidelines for Municipal and Other Public Information-Systems (1976): Local Government Studies - New Series, Vol. 2, Issue 2, 1976, p76-77.

A Note on the Confinement Problem (1973): Communications of the ACM, Vol. 16, Issue 10, October 1973, p613-615. This note explores the problem of confining a program during its execution so that it cannot transmit information to any other program except its caller. A set of examples attempts to stake out the boundaries of the problem. Necessary conditions for a solution are stated and informally justified.

On the Implementation of Security Measures in Information Systems (1972): Communications of the ACM, Vol 15, Issue 4, April 1972, p211-220. Discusses a model matrix for the implementation of security measures in information systems. Elements of the model matrix; Functions used in accessing the matrix in translation and execution time; Effect of comparison between data dependent and data independent decision rules on frequency of security checking.

Landmark Study of ComputerPrivacy Problems Completed (1972): Communications of the ACM, Vol. 15, Issue 12, December 1972, p1096-1097. The article presents information about a study on the computer-privacy issue. The study has been completed by the National Academy of Sciences project on computer data banks, headed by Alan F. Westin, professor of public law and government at Columbia University. The study has resulted in a 500-page book "Databanks in a Free Society," that calls for embedding in every major record system in the nation "appropriate safeguards for the individual's rights to privacy, confidentiality, and due process." Westin and his associates have discovered what they call "factual misunderstandings" about the computer's invasion of privacy, almost a folklore that has developed in the past few years. The use of the social security number is one example. Other misconceptions discussed in the book include the belief that bringing in a computer inevitably leads organizations to: collect more detailed and intrusive information about individuals; consolidate confidential information from previously separate files; and share confidential personal data with government agencies and private organizations that had not received it before.

How Does Your Bank Stack Up In Insurance Against EDP Losses? (1971 | PDF): Banking, Vol. 63, April 1971. Article discusses why electronic data has great value to banking institutions, and is worth insuring against not just damage, but against errors and theft resulting in data loss.

1971

business

Wearstler, E. W.

Computer Center is for Safety, Not for Show (1971 | PDF): Banking, Vol. 63, April 1971, p70.

Privacy, Security, And A Free America (1970 | PDF): Vital Speeches of the Day, Vol. 37, Issue 2, 11/1/1970, p44. Presents the text of a speech given by New Jersey Congressman Frank Horton on September 15, 1970, which deals with computer privacy and security.

1970

government

Operations Bulletin

New Threats and New Defenses (1970 | PDF): Banking, Vol. 63, August 1970, p69-70. Article discusses the need for banks to secure computers and their storage materials just as they would other valuables. Includes interview with Louis Scoma, Jr., of Data Processing Security, Inc.

1970

banking

Rush, James E.

Administrative and Financial Aspects of Computers in Education (1970): Journal of the American Society for Information Science, Vol. 21, Issue 4, Jul-Aug 1970, p299-302. This paper discusses in a general way the acquisition of computing facilities. Guidelines are given for how to start in computing, what factors to consider in the acquisition of one's own equipment, where to get advice, who should use the facilities, and how to provide security and privacy for the user and for the facility.

Computer Fraud - A Management Trap (1969 | PDF): Business Horizons, Vol. 12, June 1969, p25-30. Article discusses the need for implementing security against fraud and embezzlement in computer-based accounting systems, just as in their "noncomputer" counterparts.

Advanced Cryptographic Techniques for Computers (1969): Communications of the ACM, Vol. 12, Issue 12, December 1969, p664-665. Cryptographic techniques which can be used to maintain the confidentiality of information processed by computers are dealt with. Special emphasis is paid to the unique characteristics of computer files that make many cryptographic methods of little use. Relative security, costs, and preferred methods are included in this paper.

Danger Ahead! Safeguard Your Computer (1968 | PDF): Harvard Business Review, Vol. 46, November 1968, p97-101. Early article discussing the common threats to electronic data, including physical damage, mechanical and operator error, and theft and sabotage. Allen makes the case that Electronic Data Processing had emerged from the "crash" projects that had characterized it in the beginning, and needed to fall under a mature system of auditing and security safeguards.

Security and Privacy (1967): Communications of the ACM, Vol. 10, Issue 6, July 1967, p379-380. Presents the author's views on the Spring Joint Computer Conference that was held in April 1967. Emphasis given to the protection of the sensitive information in multiple-access computers; Information on a session of computer users and designers on security and privacy, in which a consensus was developed by the speakers that this information can be protected in the computer; Report that the twenty-five government agencies will contribute information to this center, including data on manpower and data on the executive talents available to the government.